/linux/arch/arm/probes/kprobes/ |
H A D | checkers-arm.c | 87 [PROBES_LDRSTRD] = {.checker = arm_check_stack}, 88 [PROBES_STORE_EXTRA] = {.checker = arm_check_stack}, 89 [PROBES_STORE] = {.checker = arm_check_stack}, 90 [PROBES_LDMSTM] = {.checker = arm_check_stack}, 160 [PROBES_MRS] = {.checker = arm_check_regs_normal}, 161 [PROBES_SATURATING_ARITHMETIC] = {.checker = arm_check_regs_normal}, 162 [PROBES_MUL1] = {.checker = arm_check_regs_normal}, 163 [PROBES_MUL2] = {.checker = arm_check_regs_normal}, 164 [PROBES_MUL_ADD_LONG] = {.checker = arm_check_regs_normal}, 165 [PROBES_MUL_ADD] = {.checker = arm_check_regs_normal}, [all …]
|
H A D | checkers-thumb.c | 79 [PROBES_T32_LDMSTM] = {.checker = t32_check_stack}, 80 [PROBES_T32_LDRDSTRD] = {.checker = t32_check_stack}, 81 [PROBES_T32_LDRSTR] = {.checker = t32_check_stack}, 101 [PROBES_T16_PUSH] = {.checker = t16_check_stack},
|
/linux/drivers/net/wireguard/ |
H A D | cookie.c | 19 void wg_cookie_checker_init(struct cookie_checker *checker, in wg_cookie_checker_init() argument 22 init_rwsem(&checker->secret_lock); in wg_cookie_checker_init() 23 checker->secret_birthdate = ktime_get_coarse_boottime_ns(); in wg_cookie_checker_init() 24 get_random_bytes(checker->secret, NOISE_HASH_LEN); in wg_cookie_checker_init() 25 checker->device = wg; in wg_cookie_checker_init() 45 void wg_cookie_checker_precompute_device_keys(struct cookie_checker *checker) in wg_cookie_checker_precompute_device_keys() argument 47 if (likely(checker->device->static_identity.has_identity)) { in wg_cookie_checker_precompute_device_keys() 48 precompute_key(checker->cookie_encryption_key, in wg_cookie_checker_precompute_device_keys() 49 checker->device->static_identity.static_public, in wg_cookie_checker_precompute_device_keys() 51 precompute_key(checker->message_mac1_key, in wg_cookie_checker_precompute_device_keys() [all …]
|
H A D | cookie.h | 41 void wg_cookie_checker_init(struct cookie_checker *checker, 43 void wg_cookie_checker_precompute_device_keys(struct cookie_checker *checker); 47 enum cookie_mac_state wg_cookie_validate_packet(struct cookie_checker *checker, 55 struct cookie_checker *checker);
|
/linux/lib/ |
H A D | fortify_kunit.c | 202 #define TEST_kmalloc(checker, expected_size, alloc_size) do { \ argument 207 checker(expected_size, kmalloc(alloc_size, gfp), \ 209 checker(expected_size, \ 212 checker(expected_size, kzalloc(alloc_size, gfp), \ 214 checker(expected_size, \ 217 checker(expected_size, kcalloc(1, alloc_size, gfp), \ 219 checker(expected_size, kcalloc(alloc_size, 1, gfp), \ 221 checker(expected_size, \ 224 checker(expected_size, \ 227 checker(expected_size, kmalloc_array(1, alloc_size, gfp), \ [all …]
|
H A D | Kconfig.ubsan | 6 bool "Undefined behaviour sanity checker" 9 This option enables the Undefined Behaviour sanity checker.
|
/linux/drivers/firmware/psci/ |
H A D | Kconfig | 6 bool "ARM PSCI checker" 9 Run the PSCI checker during startup. This checks that hotplug and 12 The torture tests may interfere with the PSCI checker by turning CPUs 13 on and off through hotplug, so for now torture tests and PSCI checker
|
/linux/Documentation/features/debug/KASAN/ |
H A D | arch-support.txt | 4 # description: arch supports the KASAN runtime memory checker
|
/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | adf_mstate_mgr.h | 69 adf_mstate_preamble_checker checker,
|
/linux/tools/testing/kunit/test_data/ |
H A D | test_interrupted_tap_output.log | 13 [ 0.060000] Btrfs loaded, crc32c=crc32c-generic, debug=on, assert=on, integrity-checker=on, ref-…
|
/linux/fs/affs/ |
H A D | Changes | 16 - The partition checker (drivers/block/genhd.c) 100 - Changed partition checker to allow devices 103 - The partition checker now also ignores the 338 - Partition checker for genhd.c
|
/linux/Documentation/dev-tools/ |
H A D | ubsan.rst | 6 UBSAN is a runtime undefined behaviour checker.
|
H A D | sparse.rst | 8 Sparse is a semantic checker for C programs; it can be used to find a
|
H A D | checkuapi.rst | 7 The UAPI checker (``scripts/check-uapi.sh``) is a shell script which 367 The UAPI checker makes no assumptions about the author's intention, so some
|
/linux/arch/arm/probes/ |
H A D | decode.h | 291 probes_check_t *checker; member
|
H A D | decode.c | 355 probes_check_t *checker_func = (*p)[action].checker; in run_checkers()
|
/linux/fs/btrfs/ |
H A D | Makefile | 33 uuid-tree.o props.o free-space-tree.o tree-checker.o space-info.o \
|
/linux/Documentation/translations/zh_CN/kernel-hacking/ |
H A D | hacking.rst | 676 * At least we *know* we can't spell, and use a spell-checker. 685 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
|
/linux/Documentation/process/ |
H A D | submit-checklist.rst | 65 1) Check for trivial violations with the patch style checker prior to
|
H A D | submitting-patches.rst | 217 Check your patches with the patch style checker prior to submission 218 (scripts/checkpatch.pl). Note, though, that the style checker should be 222 The checker reports at three levels:
|
/linux/drivers/of/ |
H A D | base.c | 633 bool (*checker)(const struct device_node *)) in of_get_next_status_child() 644 if (!checker(next)) in of_get_next_status_child()
|
/linux/Documentation/kernel-hacking/ |
H A D | hacking.rst | 798 * At least we *know* we can't spell, and use a spell-checker. 807 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
|
/linux/Documentation/translations/it_IT/kernel-hacking/ |
H A D | hacking.rst | 837 * At least we *know* we can't spell, and use a spell-checker. 846 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
|
/linux/Documentation/driver-api/ |
H A D | device-io.rst | 157 readl()/writel() functions. The 'sparse' semantic code checker can be used to
|
/linux/Documentation/translations/it_IT/process/ |
H A D | 4.Coding.rst | 293 Uno degli strumenti di debugging più tosti è il *locking checker*, o
|